Patent application number | Description | Published |
20110030058 | SYSTEM AND METHOD FOR SCANNING AND MARKING WEB CONTENT - Instructions to access content at a destination node is intercepted. Content at the destination node is analyzed for malicious components, and results of the analysis are associated with the content prior to being presented to viewers of the content. | 02-03-2011 |
20120047509 | Systems and Methods for Improving Performance of Computer Systems - Priorities of an application and/or processes associated with an application executing on a computer is determined according to user-specific usage patterns of the application and stored for subsequent use, analysis and distribution. | 02-23-2012 |
20120303477 | Systems and Methods for Recommending Software Applications - A potentially beneficial software product is recommended to a user based, in part, on an analysis of parameters associated with the user's usage of software applications already installed on the user's computer. | 11-29-2012 |
20130019310 | DETECTION OF ROGUE SOFTWARE APPLICATIONSAANM Ben-Itzhak; YuvalAACI BrnoAACO CZAAGP Ben-Itzhak; Yuval Brno CZAANM Osis; KasparsAACI RigaAACO LVAAGP Osis; Kaspars Riga LVAANM Boz; MikeAACI Foster CityAAST CAAACO USAAGP Boz; Mike Foster City CA US - Software applications are analyzed to determine if they are legitimate applications and warnings are provided to users to avoid installation and/or purchases of unnecessary and/or potentially harmful software based on comparisons of user-interface characteristics of the software applications to visual characteristics of authentic applications to determine to what extent they match (or do not match) or are attempting to mirror the legitimate application. | 01-17-2013 |
20130227544 | Systems and Methods for Enhancing Performance of Software Applications - A system for enhancing performance of a software application obtains a list of files to be processed by the software application, and sorts that list in the order of the physical position of files in the list on a hard drive. The files are loaded in the sorted order which can decrease or minimize the total file seeking time, thereby increasing the speed of execution of the software. | 08-29-2013 |
20130297626 | SYSTEMS AND METHODS FOR EXTRACTION OF POLICY INFORMATION - In a system for extracting policy information from text, a processor analyzes if the text is relevant to a top-level category, and then determines if at least a portion of the text is relevant to categories and subcategories within a taxonomy of categories and subcategories related to the top-level category. If at least a portion of the text is determined to be relevant to the category/subcategory, a classifier extracts policy information associated with the category/subcategory. Using text that includes a known policy the classifiers can be trained to correctly recognize categories/subcategories, and the values associated therewith. | 11-07-2013 |
20150020083 | SYSTEMS AND METHODS FOR PROVIDING USER-SPECIFIC CONTENT ON AN ELECTRONIC DEVICE - Systems and methods for providing user-specific content on an electronic device are disclosed. The user-specific data can be generated in isolated applications that are prohibited from communicating directly with one another. Sharing of user data that enables these isolated applications to generate such user-specific data can be facilitated by the use of a master program that can be loaded along with each of the isolated applications on the electronic device. | 01-15-2015 |
20150024787 | MOBILE DEVICE TRACKING PREVENTION METHOD AND SYSTEM - A mobile device tracking prevention method and system includes monitoring a mobile device for movement, determining whether an operating state of a wireless module of the mobile device should be adjusted when movement of the mobile device is detected, and controlling the operating state of the wireless module based on the determination. One or more of the actual geographic location of the mobile device, network IDs broadcasted by nearby network access points, and signal strengths of the access points as detected by the mobile device can be monitored to detect movement of the mobile device. Changes to any of these may be indicative of movement of the mobile device, which may serve as the basis for enabling or disabling the wireless module to prevent tracking of the mobile device without sacrificing user productivity. | 01-22-2015 |